::arg().set("negquery-cache-ttl","Seconds to store negative query results in the QueryCache")="60";
::arg().set("query-cache-ttl","Seconds to store query results in the QueryCache")="20";
::arg().set("server-id", "Returned when queried for 'id.server' TXT or NSID, defaults to hostname - disabled or custom")="";
- ::arg().set("default-soa-content","Default SOA content")="a.misconfigured.powerdns.server hostmaster.@ 0 10800 3600 604800 3600";
+ ::arg().set("default-soa-content","Default SOA content")="a.misconfigured.dns.server.invalid hostmaster.@ 0 10800 3600 604800 3600";
::arg().set("default-soa-edit","Default SOA-EDIT value")="";
::arg().set("default-soa-edit-signed","Default SOA-EDIT value for signed zones")="";
::arg().set("dnssec-key-cache-ttl","Seconds to cache DNSSEC keys from the database")="30";
::arg().set("cache-ttl","Seconds to store packets in the PacketCache")="20";
::arg().set("negquery-cache-ttl","Seconds to store negative query results in the QueryCache")="60";
::arg().set("query-cache-ttl","Seconds to store query results in the QueryCache")="20";
- ::arg().set("default-soa-content","Default SOA content")="a.misconfigured.powerdns.server hostmaster.@ 0 10800 3600 604800 3600";
+ ::arg().set("default-soa-content","Default SOA content")="a.misconfigured.dns.server.invalid hostmaster.@ 0 10800 3600 604800 3600";
::arg().set("chroot","Switch to this chroot jail")="";
::arg().set("dnssec-key-cache-ttl","Seconds to cache DNSSEC keys from the database")="30";
::arg().set("domain-metadata-cache-ttl","Seconds to cache domain metadata from the database")="60";
if k in payload:
self.assertEquals(data[k], payload[k])
# validate generated SOA
- expected_soa = "a.misconfigured.powerdns.server. hostmaster." + name + " " + \
+ expected_soa = "a.misconfigured.dns.server.invalid. hostmaster." + name + " " + \
str(payload['serial']) + " 10800 3600 604800 3600"
self.assertEquals(
get_first_rec(data, name, 'SOA')['content'],
self.assertIn('zone', data)
expected_data = [name + '\t3600\tIN\tNS\tns1.foo.com.',
name + '\t3600\tIN\tNS\tns2.foo.com.',
- name + '\t3600\tIN\tSOA\ta.misconfigured.powerdns.server. hostmaster.' + name +
+ name + '\t3600\tIN\tSOA\ta.misconfigured.dns.server.invalid. hostmaster.' + name +
' 0 10800 3600 604800 3600']
self.assertEquals(data['zone'].strip().split('\n'), expected_data)
data = r.text.strip().split("\n")
expected_data = [name + '\t3600\tIN\tNS\tns1.foo.com.',
name + '\t3600\tIN\tNS\tns2.foo.com.',
- name + '\t3600\tIN\tSOA\ta.misconfigured.powerdns.server. hostmaster.' + name +
+ name + '\t3600\tIN\tSOA\ta.misconfigured.dns.server.invalid. hostmaster.' + name +
' 0 10800 3600 604800 3600']
self.assertEquals(data, expected_data)
{u'content': u'ns2.example.com.',
u'zone_id': name, u'zone': name, u'object_type': u'record', u'disabled': False,
u'ttl': 3600, u'type': u'NS', u'name': name},
- {u'content': u'a.misconfigured.powerdns.server. hostmaster.'+name+' 22 10800 3600 604800 3600',
+ {u'content': u'a.misconfigured.dns.server.invalid. hostmaster.'+name+' 22 10800 3600 604800 3600',
u'zone_id': name, u'zone': name, u'object_type': u'record', u'disabled': False,
u'ttl': 3600, u'type': u'SOA', u'name': name},
])
{u'content': u'ns2.example.com.',
u'zone_id': name, u'zone': name, u'object_type': u'record', u'disabled': False,
u'ttl': 3600, u'type': u'NS', u'name': name},
- {u'content': u'a.misconfigured.powerdns.server. hostmaster.'+name+' 22 10800 3600 604800 3600',
+ {u'content': u'a.misconfigured.dns.server.invalid. hostmaster.'+name+' 22 10800 3600 604800 3600',
u'zone_id': name, u'zone': name, u'object_type': u'record', u'disabled': False,
u'ttl': 3600, u'type': u'SOA', u'name': name},
])
rec = get_first_rec(data, '.', 'SOA')
self.assertEquals(
rec['content'],
- "a.misconfigured.powerdns.server. hostmaster. " + str(payload['serial']) +
+ "a.misconfigured.dns.server.invalid. hostmaster. " + str(payload['serial']) +
" 10800 3600 604800 3600"
)
# Regression test: verify zone list works